Eric Chan-Tin
Orcid: 0000-0001-8367-5836
According to our database1,
Eric Chan-Tin
authored at least 55 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Hardening Interpretable Deep Learning Systems: Investigating Adversarial Threats and Defenses.
IEEE Trans. Dependable Secur. Comput., 2024
From Attack to Defense: Insights into Deep Learning Security Measures in Black-Box Settings.
CoRR, 2024
Unmasking the Vulnerabilities of Deep Learning Models: A Multi-Dimensional Analysis of Adversarial Attacks and Defenses.
Proceedings of the Silicon Valley Cybersecurity Conference, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
Unveiling Vulnerabilities in Interpretable Deep Learning Systems with Query-Efficient Black-box Attacks.
CoRR, 2023
Microbial Genetic Algorithm-based Black-box Attack against Interpretable Deep Learning Systems.
CoRR, 2023
Proceedings of the 24th International Workshop on Mobile Computing Systems and Applications, 2023
Proceedings of the Silicon Valley Cybersecurity Conference, 2023
Proceedings of the Silicon Valley Cybersecurity Conference, 2023
Proceedings of the Computational Data and Social Networks - 12th International Conference, 2023
2022
EAI Endorsed Trans. Security Safety, 2022
Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning.
CoRR, 2022
Predicting Phishing Victimization: Roles of Protective and Vulnerable Strategies and Decision-Making Styles.
Proceedings of the SNTA@HPDC 2022, 2022
MLxPack: Investigating the Effects of Packers on ML-based Malware Detection Systems Using Static and Dynamic Traits.
Proceedings of the CySSS@AsiaCCS'22: Proceedings of the 1st Workshop on Cybersecurity and Social Sciences, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
EAI Endorsed Trans. Security Safety, 2021
Proceedings of the EICC '21: European Interdisciplinary Cybersecurity Conference, 2021
Proceedings of the Computational Data and Social Networks - 10th International Conference, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Proceedings of the 3rd International Workshop on Systems and Network Telemetry and Analytics, 2020
Addressing Rogue Vehicles by Integrating Computer Vision, Activity Monitoring, and Contextual Information.
Proceedings of the Adjunct Proceedings of the 12th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, 2020
2019
EAI Endorsed Trans. Security Safety, 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Int. J. Secur. Networks, 2018
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
2017
Peer-to-Peer Netw. Appl., 2017
CoRR, 2017
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
2016
Development of a Virtual Reality Based Simulation Environment for Orthopedic Surgical Training.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2016 Workshops, 2016
2015
Secur. Commun. Networks, 2015
Why we hate IT: two surveys on pre-generated and expiring passwords in an academic setting.
Secur. Commun. Networks, 2015
IET Inf. Secur., 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Int. J. Handheld Comput. Res., 2014
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the 48th Asilomar Conference on Signals, Systems and Computers, 2014
2013
Attacking the kad network - real world evaluation and high fidelity simulation using DVN.
Secur. Commun. Networks, 2013
Introducing a Distributed Cloud Architecture with Efficient Resource Discovery and Optimal Resource Allocation.
Proceedings of the IEEE Ninth World Congress on Services, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
ACM Trans. Inf. Syst. Secur., 2011
Proceedings of the Network and Distributed System Security Symposium, 2011
2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems.
Proceedings of the Security and Privacy in Communication Networks, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008